-
-
Notifications
You must be signed in to change notification settings - Fork 4.7k
feat(ip): use larger IPv6 range by default #52015
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/backport to stable31 |
|
/backport to stable30 |
|
/backport to stable29 |
Some providers assign `/48` IPv6 blocks instead of `/64` so it sounds safer to use this mask by default. Signed-off-by: Benjamin Gaussorgues <[email protected]>
132fec0 to
c4021c8
Compare
|
Which providers give out /48? I want to sign up immediately! More seriously, I think this PR is a bad idea. I know of some ISPs who give out /56, but what problem does this PR actually solve? Blocking IPs is effective against botnets infecting machines and using them to brute-force passwords. If they have admin access to that machine, they can ask for a virtually unlimited of IPv6 addresses in the /64 of the network only, whether or not the ISP attributes a larger PD to the customer. By blocking a /48 you're probably netting a whole European country or US State provider mobile network. That is going to be a lot of false positives to deal with. |
|
Hello, We have at least the example of Init7. I agree there is still a lot of ways to avoid brute-force protection but the goal is to make it a bit more difficult for a home user to bypass it. We may use a different approach if we see too many false positives but Local Internet Registries (mostly ISP) should receive |
Indeed. 10 users in our university's wifi accessing the same expired public link already trigger the bruteforce protection (because it is interpreted as "bruteforcing" public tokens). Now with this change not only the wifi network segment but also a whole chunk of many other network segments on campus will be throttled or blocked because of handful of users clicking on an expired link. This is a terrible decision IMHO |
|
Hello @DanScharon, @kubrickfr I created a follow-up here: #52223 |
https://www.init7.net and every other ISP that follows Ripe 690 recommendations.
How is that any different from IPv4? |
Nextcloud's bruteforce protection throttles/blocks only that one IPv4 address, not its whole subnet.
No. I can hardly imagine any university which has only one public IPv4 address for all its wifi users behind a NAT.
Irrevelant for our described use case |
The equivalent of a single IP in the IPv4 world is a /48 prefix in the IPv6 world.
True, but for every IPv4, you should also get a /48 prefix.
And the same can be done for IPv6 with ULA. Your example of the expired links isn't an IPv6 problem. Only allowing 10 links until you get banned, while at the same time allowing 64k attacks (with /64 blocking) or 256 attacks (with /56 blocking) from one single /48 customer would be a strange imbalance. |
Summary
Some providers assign
/48IPv6 blocks instead of/64so it sounds safer to use this mask by default.Checklist